CN102521547B - Protecting system for access control system in virtual domain - Google Patents

Protecting system for access control system in virtual domain Download PDF

Info

Publication number
CN102521547B
CN102521547B CN201110423115.8A CN201110423115A CN102521547B CN 102521547 B CN102521547 B CN 102521547B CN 201110423115 A CN201110423115 A CN 201110423115A CN 102521547 B CN102521547 B CN 102521547B
Authority
CN
China
Prior art keywords
submodule
module
making
strategic decision
strategic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201110423115.8A
Other languages
Chinese (zh)
Other versions
CN102521547A (en
Inventor
金海�
邹德清
杨凯
段培
胡刚
项国富
陈刚
代炜琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huazhong University of Science and Technology
Original Assignee
Huazhong University of Science and Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huazhong University of Science and Technology filed Critical Huazhong University of Science and Technology
Priority to CN201110423115.8A priority Critical patent/CN102521547B/en
Publication of CN102521547A publication Critical patent/CN102521547A/en
Application granted granted Critical
Publication of CN102521547B publication Critical patent/CN102521547B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a protecting system for an access control system in a virtual domain, which comprises a policy executing module, a policy decision buffering module, a policy server module and an internal memory protecting module. The policy executing module is used for intercepting low-level semantics, converting the intercepted low-level semantics into high-level semantics, transmitting the high-level semantics to the policy decision buffering module and acquiring policy decision results, the policy decision buffering module is used for receiving the high-level semantics from the policy executing module, transmitting the high-level semantics to the policy server module, acquiring the policy decision results from the policy server module, transmitting the policy decision results to the policy executing module and caching the policy decision results, and the policy server module is used for searching a safety policy library thereof according to the high-level semantics so as to generate policy decision results. The access control system in the virtual domain can be protected from being attacked by the protecting system, and the safety thereof is improved.

Description

The protection system of access control system in virtual domain
Technical field
The invention belongs to the virtual and computer system security field of computer resource, be specifically related to a kind of protection system of access control system in virtual domain.
Background technology
Forcing access control (Mandatory Access control is called for short MAC) is a kind of method that effectively prevents that computer system from being attacked.MAC can prevent the malicious code abuse resource of malicious user or the operation of imitation validated user, and this is that malicious code does not have systematic license can not revise security strategy because MAC access rule can only be revised by system manager.Various patterns and system have been applied to different operating system, as SELinux, Linux (the Security Enhanced Linux of Trustees, security expansion, be called for short SELinux), be wherein the most representative, have a flexible and enforceable access control structure, the security that can improve linux system, strong safety assurance is provided, can defends unknown attack.
But there is the problem that can not ensure self-security in existing access control system.MAC system operates in user model or kernel mode.Rogue program (such as Rootkit etc.) often operates in kernel mode, not only can see the memory information of all user programs, can also walk around the inspection of security system, can also make security system normally start.There is the security that can not effectively ensure self in traditional pressure access control system, this problem is insurmountable under conventional architectures.
Summary of the invention
The object of the present invention is to provide a kind of protection system of access control system in virtual domain, it can protect access control system in virtual domain, makes it avoid meeting with attack, the security that improves access control system in virtual domain.
The present invention is achieved by the following technical solutions:
A kind of protection system of access control system in virtual domain, comprise policy enforcement module, strategic decision-making cache module, strategic server module and memory protect module, policy enforcement module is used for tackling rudimentary semanteme, the rudimentary semanteme of interception is converted to senior semanteme, senior semanteme is sent to strategic decision-making cache module, and from the strategic decision-making cache module acquisition strategy result of decision, strategic decision-making cache module is for receiving senior semanteme from policy enforcement module, senior semanteme is sent to strategic server module, strategic decision-making cache module is from the strategic server module acquisition strategy result of decision, strategic decision-making result is sent to policy enforcement module, and the tactful result of decision is carried out to buffer memory, strategic server module is used for according to its security policy database of senior semantic searching, with the generation strategy result of decision, and strategic decision-making result is sent to strategic decision-making cache module, memory protect module is immune against attacks for the protection of policy enforcement module and strategic decision-making cache module.
System of the present invention also comprises dispatching management module; for security strategy being loaded into strategic server module before virtual machine activation; in the time that virtual machine is cancelled, security strategy is deleted from strategic server module, and initialization the memory protect list of managed storage in dispatching management module in the time of virtual machine activation.
Memory protect module is to protect policy enforcement module and strategic decision-making cache module to be immune against attacks by the write permission of region of memory in memory protect list.
Policy enforcement module comprises operation intercepting submodule and operation analyzing sub-module, operation intercepting submodule is used for tackling rudimentary semanteme, operation analyzing sub-module is for being converted to rudimentary semanteme the senior semantemes such as progress information, file operation information and network link information, senior semanteme is sent to strategic server module, and from the strategic decision-making cache module acquisition strategy result of decision.
Strategic decision-making cache module comprises inquiry submodule, message is prepared submodule, message submodule, strategy reading submodule, upgrade submodule and buffer sublayer module, whether inquiry submodule is for there is senior semanteme according to inquiry buffer zone module, if existed, directly strategic decision-making result is returned to policy enforcement module, otherwise message call is prepared submodule and message submodule obtains security strategy from the security policy database of strategic server module, message is prepared submodule for senior semanteme being write to shared drive region in the time not there is not senior semanteme, and message call transmission message submodule notification strategy server module reads the senior semanteme in shared drive region, message submodule reads the senior semanteme in shared drive region for notification strategy server module, in shared drive region, strategy reading submodule is for reading the security strategy of security policy database, and security strategy is passed to renewal submodule, upgrade submodule and be used for deleting the least-recently-used record of buffer sublayer module, new record is inserted in buffer sublayer module, in order to inquiry next time, and strategic decision-making result is returned to inquiry submodule, buffer sublayer module is for preserving the strategic decision-making result using at most recently.
Strategic server module comprises notice submodule, read shared drive submodule, strategic decision-making submodule, write shared drive submodule and policy library, notice submodule is for the notification message of receipt message submodule, and call and read shared drive submodule and read notification message, and writing shared drive submodule after the write-in policy result of decision of shared drive region, notification strategy decision-making cache module is taken strategic decision-making result away, read shared drive submodule for reading senior semantic sharing region of memory, and senior semanteme is sent to strategic decision-making submodule, strategic decision-making submodule according to senior semantic query security policy database to obtain relevant security strategy, obtain strategic decision-making result according to security strategy, and strategic decision-making result is sent to and writes shared drive submodule, write shared drive submodule for strategic decision-making result is write to shared drive region, security policy database is used for depositing security strategy.
Memory protect module comprises intercepts and captures submodule, processing submodule and memory protect list; intercept and capture submodule for intercepting and capturing the write operation of virtual Domain internal memory; and call processing submodule write operation is processed; process submodule for being compared in the address of the address of region of memory corresponding write operation and memory protect list region of memory; if result unanimously stops write operation, the address of memory protect list for storing protected region of memory.
The present invention has the following advantages and technique effect:
(1) resist user's state and kernel state attacks simultaneously
Native system is taked different guard methods to the different module of access control system; utilize the shadow page table mechanism of virtual machine; security module in client operating system is protected, prevented from such as, attacking from the rogue program in client operating system (Rootkit etc.).Strategic server and policy management module are put into management domain, utilize the isolation of virtual machine, increase the difficulty of malware attacks.Communication between management domain and client operating system adopts shared drive mechanism, and VMM can effectively ensure the safety of this communication.Therefore, whole MAC can resist the attack from user's state and kernel state simultaneously;
(2) communication overhead approaches local expense
Communication is whole system performance bottleneck place, owing to adopting caching technology, suitably adjust buffer size, the rate that exists of searching can be brought up to 99% left and right, therefore the speed of access security strategy approaches the speed of the local internal memory of access, greatly reduces whole system expense;
(3) unified management security strategy
Virtual can execution environment under, on a physical machine, can move many client operating systems, if for client operating system configuration security strategy, must login in this client operating system and manage operation.Along with the increase of client operating system number, safety officer need to login or exit virtual machine frequently, brings very large inconvenience to security policy manager.In the present invention, the security strategy of all client operating systems is placed in management domain, can well manages concentratedly.The security strategy of Xen and the security strategy of client operating system were all separated in the past, in the present invention, can in same interface, be configured.To security strategy unified management, can greatly alleviate safety officer's burden;
(4) versatility
The present invention is at Linux security module (Linux Security Module; be called for short LSM) basis on the prototype system that completes; because LSM provides general interface; the present invention can protect our pressure access control system, also can utilize LSM exploitation to force access control system.
Brief description of the drawings
Fig. 1 is the schematic block diagram of the protection system of access control system in virtual domain of the present invention.
Embodiment
Below first technical term of the present invention is explained and illustrated.
Rudimentary semanteme: the operational semantics that when system is carried out, machine can be identified
Senior semanteme: the operational semantics that when system is carried out, system manager can identify
Security strategy: the criterion when system of formulating taking Information Security as object is moved.
Progress information: process number when process operation, the information such as process number.
File operation information: the reading and writing of system to file, deletion, establishment etc.
Below in conjunction with accompanying drawing, the present invention is further detailed explanation.
As shown in Figure 1, the protection system of access control system in virtual domain of the present invention comprises policy enforcement module 1, strategic decision-making cache module 2, strategic server module 3, dispatching management module 4 and memory protect module 5.
Policy enforcement module 1, for tackling rudimentary semanteme, is converted to senior semanteme by the rudimentary semanteme of interception, and senior semanteme is sent to strategic decision-making cache module 2, and from the strategic decision-making cache module 2 acquisition strategy results of decision.
Strategic decision-making cache module 2 is for receiving senior semanteme from policy enforcement module 1, senior semanteme is sent to strategic server module 3, strategic decision-making cache module 2 is from the strategic server module 3 acquisition strategy results of decision, strategic decision-making result is sent to policy enforcement module 1, and the tactful result of decision is carried out to buffer memory.
Strategic decision-making cache module 2 is in the kernel spacing of client operating system, adopts the mode driving to load, and utilizes caching technology to reduce communication overhead.
Strategic server module 3, for according to its security policy database of senior semantic searching, with the generation strategy result of decision, and is sent to strategic decision-making cache module 2 by strategic decision-making result;
Strategic server module 3 is kernel modules that the security strategy of multiple client operating systems is managed, and it is in the kernel state of management domain.It provides parsing and the storage of security strategy, and the security strategy of loading is also resolved and stored it, is beneficial to query manipulation.The service of client operating system operation is not quite similar, and needed level of security is also different, so the security strategy of different client operating systems is separate managements.
Dispatching management module 4 manages security strategy, and the interface that list manages to memory protect is provided.When user need to manage the security strategy of certain client operating system, only need in management domain, the security strategy to virtual machine modify, do not need to enter this virtual machine.In virtual machine creating or while closing, need construction strategy storehouse or discharge policy library resource.The isolation that virtual machine architecture itself has, can be good at protecting the safety of security strategy.
Memory protect module 5 is immune against attacks for the protection of policy enforcement module 1 and strategic decision-making cache module 2.
Client operating system is unsafe, and system highest weight limit is easy to be stolen, for ensure in this case access control system system can be normally, effectively move, we must provide protection to the security module in client operating system.Memory protect module 5 is to be in Virtual Machine Manager layer, and its level of privilege is lower than the level of privilege of client operating system nucleus, has higher administration authority.Virtual Machine Manager layer can be interfered amendment internal memory operations all in client operating system, and we utilize this mechanism to protect the internal memory of security module and kernel internal memory not to be revised by malicious code.
Policy enforcement module 1 comprises operation intercepting submodule 11 and operation analyzing sub-module 12.
Operation intercepting submodule 11 is for tackling rudimentary semanteme.
Operation analyzing sub-module 12, for rudimentary semanteme being converted to the senior semantemes such as progress information, file operation information and network link information, is sent to strategic server module 3 by senior semanteme, and from the strategic decision-making cache module 2 acquisition strategy results of decision.
Operation analyzing sub-module 12 is based on LSM access control framework, and most operation (SuSE) Linux OS has this framework, and it provides safe interface, and user can write according to the demand of oneself event handling function of oneself.Realize the operation such as process, file in system is tackled.This is to register when system starts.Operation analyzing sub-module 12 is processed the event producing in process operation process, and what comprise process creation, progress information obtains, arranges process priority etc., and these operations are carried out to security strategy inspection; The operation of file is carried out to security strategy inspection, as operations such as reading and writing, execution, connections.File comprises ordinary file, catalogue file and special file; Network operation is carried out to security strategy inspection, as the establishment of network linking, address binding etc.
Strategic decision-making cache module 2 comprises inquiry submodule 21, message preparation submodule 22, message submodule 23, tactful reading submodule 24, upgrades submodule 25 and buffer sublayer module 26;
Whether inquiry submodule 21 is for there is senior semanteme according to inquiry buffer zone module 26, if existed, directly strategic decision-making result is returned to policy enforcement module 1, otherwise message call is prepared submodule 22 and message submodule 23 obtains security strategy from the security policy database of strategic server module 3.
Message is prepared submodule 22 in the time not there is not senior semanteme, senior semanteme being write to shared drive region, and message call transmission message submodule 23 notification strategy server modules 3 read the senior semanteme in shared drive region.
Message submodule 23 reads the senior semanteme in shared drive region for notification strategy server module 3.
Strategic decision-making cache module 2, in the time communicating by letter with strategic server module 3, need to ensure the synchronous of communication by message mechanism.Message submodule 23 has been exactly this function, and communicating by letter between management domain and guest virtual machine operating system can normally be carried out.
Strategy reading submodule 24 for reading the security strategy of security policy database, and by security strategy pass to upgrade submodule 25.
Upgrade submodule 25 for deleting the least-recently-used record of buffer sublayer module 26, new record is inserted in buffer sublayer module 26, in order to inquiry next time, can reduce like this and reclaim the frequent performance cost that reclaimer operation brings of carrying out; Return to inquiry submodule 21 simultaneously and by strategic decision-making result.
Buffer sublayer module 26 is for preserving the strategic decision-making result using at most recently.
Strategic server module 3 comprises notice submodule 31, reads shared drive submodule 32, strategic decision-making submodule 33, writes shared drive submodule 34 and policy library 35.
Notice submodule 31 is for the notification message of receipt message submodule 23, and call and read shared drive submodule 32 and read notification message, and writing shared drive submodule 34 after the write-in policy result of decision of shared drive region, notification strategy decision-making cache module 2 is taken strategic decision-making result away.
Read shared drive submodule 32 for reading senior semantic sharing region of memory, and senior semanteme is sent to strategic decision-making submodule 33.
Strategic decision-making submodule 33 to obtain relevant security strategy, obtains strategic decision-making result according to security strategy according to senior semantic query security policy database, and strategic decision-making result is sent to and writes shared drive submodule 34.
Write shared drive submodule 34 for strategic decision-making result is write to shared drive region, particularly, write the security decision data that shared drive submodule 34 makes tactful submodule 33 and be written in shared drive region, and allow notice submodule 31 notify the strategic decision-making cache module 2 fetch policy result of decision data of guest virtual machine operating system.
Security policy database 35 is for depositing security strategy.
Memory protect module 5 comprises intercepts and captures submodule 51, processing submodule 52 and memory protect list 53.
Intercept and capture submodule 51 for intercepting and capturing the write operation of virtual Domain internal memory, and call processing submodule 52 write operation is processed.
Process submodule 52 for being compared in the address of the address of region of memory corresponding write operation and memory protect list 53 region of memorys, if result unanimously stops write operation.
Memory protect list 53 is for storing the address of protected region of memory.
Principle of work of the present invention is as follows:
Before whole system is implemented, first need to set up security policy database.Safety officer is loaded into security strategy by dispatching management module 4 the strategic server module 3 of kernel state, and security strategy also needs to import into the mark of virtual machine, in order to distinguish the security strategy of different virtual Domain.Joining after kernel, by strategic server module 3 by security strategy according to different classifications, select different analysis modes to set up corresponding policy library 35.Arrive this, security policy database is ready to complete.
Thereafter, need in client operating system, load policy enforcement module 1, strategic decision-making cache module 2 dispatching management module 4 completes memory protect list simultaneously initialization and interpolation protection address, waiting event triggers.After Event triggered, will regulative strategy execution module 1, policy enforcement module 1 is different according to the function completing, and can be divided into: operation intercepting submodule 11 and operation analyzing sub-module 12.Interception submodule 11 is the operation in program loading procedure to be conducted interviews to control check, to the scope check of process operation, file operation is carried out to scope check, to the scope check of network operation.The information of transmitting after to Event triggered through execution module is resolved, and rudimentary semanteme is converted into senior semanteme.
After the processing of policy enforcement module 1, need to carry out scope check to corresponding operation, this will need query safe strategy.Therefore, by the semantic information obtaining, comprise the information of main body, object information, operation information etc., pass to the inquiry submodule 21 of strategic decision-making cache module 2, inquiry submodule 21 can be according to the information passing over, and access buffer submodule 26, if existed, find the result of decision, immediately result is returned to policy enforcement module 1.Otherwise, need to arrive in strategic server module 3 and obtain the result of decision.Because security strategy and strategy execution are not in same territory, so need to come by the communication means of safety the safety of guarantee information exchange between them, the mode of what the present invention adopted is shared drive is carried out secure communication.In the time there is disappearance in inquiry buffer sublayer module 26, solicited message need to be write to shared drive district, this function is to prepare submodule 22 by message to complete.Then, message submodule 23 notifies the notice submodule 31 of the strategic server module in management domain that the result of decision is taken away from shared drive district.
The notice submodule 31 of strategic server module 3 receives after the notice from strategic decision-making cache module, calls to read shared drive submodule 32 and complete the operation of the request of obtaining, and this request is sent to strategic decision-making submodule 33.Strategic decision-making submodule 33, according to reading the solicited message that shared drive submodule 32 sends over, obtains corresponding security strategy, and makes decision making package from policy library 35, finally the result of decision is returned.Then, write shared drive district by writing shared drive submodule 34, and call notification submodule 31 is told the message submodule 23 of strategic decision-making cache module 2.
When message submodule 23 is received from the notification message in virtual Domain, notification strategy reading submodule 24, read the result of decision of returning, obtain after the result of decision, call and upgrade submodule 25, this record is inserted in buffer sublayer module 26, and result is returned to inquiry submodule 21, finally by inquiry submodule 21, result is returned to policy enforcement module 1.
Finally, carried out the result of implementation strategy decision-making by policy enforcement module 1, complete the scope check to this operation.If this operation meets the regulation of security strategy, can continue to carry out, otherwise stop this operation.

Claims (5)

1. the protection system of an access control system in virtual domain; comprise policy enforcement module (1), strategic decision-making cache module (2), strategic server module (3) and memory protect module (5); it is characterized in that
Described policy enforcement module (1) is for tackling rudimentary semanteme, the rudimentary semanteme of interception is converted to senior semanteme, described senior semanteme is sent to described strategic decision-making cache module (2), and from described strategic decision-making cache module (2) the acquisition strategy result of decision;
Described strategic decision-making cache module (2) is for receiving described senior semanteme from described policy enforcement module (1), described senior semanteme is sent to described strategic server module (3), strategic decision-making cache module (2) obtains described strategic decision-making result from described strategic server module (3), described strategic decision-making result is sent to described policy enforcement module (1), and described strategic decision-making result is carried out to buffer memory;
Described strategic server module (3), for according to described its security policy database of senior semantic searching, to generate described strategic decision-making result, and is sent to described strategic decision-making cache module (2) by described strategic decision-making result;
Described memory protect module (5) is immune against attacks for the protection of described policy enforcement module (1) and described strategic decision-making cache module (2);
Described strategic decision-making cache module (2) comprises inquiry submodule (21), message preparation submodule (22), message submodule (23), tactful reading submodule (24), upgrades submodule (25) and buffer sublayer module (26);
Whether inquiry submodule (21) is for there is described senior semanteme according to the described buffer sublayer module of inquiry (26), if existed, directly described strategic decision-making result is returned to described policy enforcement module (1), otherwise call, described message is prepared submodule (22) and described message submodule (23) obtains security strategy from the security policy database of described strategic server module (3);
Described message is prepared submodule (22) in the time not there is not described senior semanteme, described senior semanteme being write to shared drive region, and calls described message submodule (23) and notify described strategic server module (3) to read the senior semanteme in described shared drive region;
Described message submodule (23) is for notifying described strategic server module (3) to read the senior semanteme in described shared drive region;
Strategy reading submodule (24), for reading the security strategy of described security policy database, and passes to described renewal submodule (25) by described security strategy;
Described renewal submodule (25) is for deleting the least-recently-used record of described buffer sublayer module (26), new record is inserted in described buffer sublayer module (26), in order to inquiry next time, and described strategic decision-making result is returned to described inquiry submodule (21);
Described buffer sublayer module (26) is for preserving the strategic decision-making result using at most recently;
Described strategic server module (3) comprises notice submodule (31), reads shared drive submodule (32), strategic decision-making submodule (33), writes shared drive submodule (34) and policy library (35);
Described notice submodule (31) is for receiving the notification message of described message submodule (23), and described in calling, read shared drive submodule (32) and read described notification message, and write after described strategic decision-making result to described shared drive region at the described shared drive submodule (34) of writing, notify described strategic decision-making cache module (2) to take described strategic decision-making result away;
The described shared drive submodule (32) of reading is for reading the senior semanteme in described shared drive region, and described senior semanteme is sent to described strategic decision-making submodule (33);
Described strategic decision-making submodule (33) according to security policy database described in described senior semantic query to obtain relevant security strategy, obtain described strategic decision-making result according to described security strategy, and write shared drive submodule (34) described in described strategic decision-making result is sent to;
Write shared drive submodule (34) for described strategic decision-making result is write to described shared drive region;
Security policy database (35) is for depositing described security strategy.
2. protection system according to claim 1, is characterized in that,
Also comprise dispatching management module (4); for security strategy being loaded into described strategic server module (3) before virtual machine activation; in the time that described virtual machine is cancelled, described security strategy is deleted from described strategic server module (3), and initialization the memory protect list of managed storage in described dispatching management module (4) in the time of described virtual machine activation.
3. protection system according to claim 2, is characterized in that:
Described memory protect module (5) is to protect described policy enforcement module (1) and described strategic decision-making cache module (2) to be immune against attacks by the write permission of region of memory in described memory protect list.
4. protection system according to claim 1, is characterized in that:
Described policy enforcement module (1) comprises operation intercepting submodule (11) and operation analyzing sub-module (12);
Described operation intercepting submodule (11) is for tackling described rudimentary semanteme;
Described operation analyzing sub-module (12) is for being converted to the senior semantemes such as progress information, file operation information and network link information by described rudimentary semanteme, described senior semanteme is sent to described strategic server module (3), and obtains described strategic decision-making result from described strategic decision-making cache module (2).
5. protection system according to claim 1, is characterized in that:
Described memory protect module (5) comprises intercepts and captures submodule (51), processing submodule (52) and memory protect list (53);
Intercept and capture submodule (51) for intercepting and capturing the write operation of virtual Domain internal memory, and call described processing submodule (52) described write operation is processed;
Described processing submodule (52) is for being compared in the address of the address of region of memory corresponding described write operation and described memory protect list (53) region of memory, if result unanimously stops described write operation;
Described memory protect list (53) is for storing the address of protected region of memory.
CN201110423115.8A 2011-12-16 2011-12-16 Protecting system for access control system in virtual domain Expired - Fee Related CN102521547B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110423115.8A CN102521547B (en) 2011-12-16 2011-12-16 Protecting system for access control system in virtual domain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110423115.8A CN102521547B (en) 2011-12-16 2011-12-16 Protecting system for access control system in virtual domain

Publications (2)

Publication Number Publication Date
CN102521547A CN102521547A (en) 2012-06-27
CN102521547B true CN102521547B (en) 2014-09-24

Family

ID=46292458

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110423115.8A Expired - Fee Related CN102521547B (en) 2011-12-16 2011-12-16 Protecting system for access control system in virtual domain

Country Status (1)

Country Link
CN (1) CN102521547B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104794407B (en) * 2015-04-16 2018-01-26 华中科技大学 A kind of virtual machine file forced access control method and system based on KVM
CN107203410B (en) * 2017-04-14 2020-02-14 华中科技大学 VMI method and system based on system call redirection
CN107203716B (en) * 2017-05-03 2020-05-22 中国科学院信息工程研究所 Lightweight structured protection method and device for Linux kernel
CN113190869B (en) * 2021-05-27 2022-10-11 中国人民解放军国防科技大学 TEE-based mandatory access control security enhancement framework performance evaluation method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309180A (en) * 2008-06-21 2008-11-19 华中科技大学 Security network invasion detection system suitable for virtual machine environment
CN101923507A (en) * 2010-07-30 2010-12-22 华中科技大学 Universal virtual machine monitoring system based on driving

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101309180A (en) * 2008-06-21 2008-11-19 华中科技大学 Security network invasion detection system suitable for virtual machine environment
CN101923507A (en) * 2010-07-30 2010-12-22 华中科技大学 Universal virtual machine monitoring system based on driving

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
A virtual machine introspection based architecture for intrusion detection;Garfinkel T et al;《Proc. of the 10thNetwork and Distributed System Security Symp》;20031231;第191至206页 *
Garfinkel T et al.A virtual machine introspection based architecture for intrusion detection.《Proc. of the 10thNetwork and Distributed System Security Symp》.2003,191-206.
Lares: An architecture for secure active monitoring using virtualization;Payne BD et al;《2008 IEEE Computer Society》;20080924;第233至247页 *
Payne BD et al.Lares: An architecture for secure active monitoring using virtualization.《2008 IEEE Computer Society》.2008,233-247.
佘影 等.基于LSM的动态多策略研究与实现.《计算机工程与设计》.2007,4108-4111.
基于LSM的动态多策略研究与实现;佘影 等;《计算机工程与设计》;20070930;第4108至4111页 *
支持动态多策略的安全体系结构应用研究;赵志科 等;《计算机工程》;20040229;第63至65页 *
赵志科 等.支持动态多策略的安全体系结构应用研究.《计算机工程》.2004,63-65.

Also Published As

Publication number Publication date
CN102521547A (en) 2012-06-27

Similar Documents

Publication Publication Date Title
CN104598809B (en) Program monitoring method and defending method thereof, as well as relevant device
CN109558211B (en) Method for protecting interaction integrity and confidentiality of trusted application and common application
CN103842971B (en) Monitor for indirect interface and the system and method for vertical line detection
US9229881B2 (en) Security in virtualized computer programs
US9628279B2 (en) Protecting application secrets from operating system attacks
EP2902937B1 (en) Method, apparatus, and system for triggering virtual machine introspection
CN101599022B (en) Trustworthy computing base cutting method used for virtual machine system
CN101520831B (en) Safe terminal system and terminal safety method
CN109933441A (en) Micro-kernel Inter-Process Communication method and system
CN108475217A (en) System and method for virtual machine of auditing
CN103620613A (en) System and method for virtual machine monitor based anti-malware security
CN102096786A (en) Cross-platform safety protection system based on hardware virtualization
CN104751050A (en) Client application program management method
CN106528269B (en) The virtual machine access control system and control method of lightweight
CN102707985A (en) Access control method and system for virtual machine system
CN112035272A (en) Method and device for interprocess communication and computer equipment
US20130254459A1 (en) Block storage virtualization on commodity secure digital cards
CN104732147A (en) Application program processing method
CN105117649A (en) Anti-virus method and anti-virus system for virtual machine
CN102521547B (en) Protecting system for access control system in virtual domain
EP3079057B1 (en) Method and device for realizing virtual machine introspection
CN103345604A (en) Sandbox system based on light-weight virtual machine monitor and method for monitoring OS with sandbox system
CN104732140A (en) Program data processing method
CN106557396A (en) Virtual machine program running state monitoring method based on qemu
Li et al. SGXPool: Improving the performance of enclave creation in the cloud

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20140924

Termination date: 20201216